Fri.Jan 27, 2023

article thumbnail

Entity Will Pay $4.3 Million Settlement in 2nd Big Hack Case

Data Breach Today

Deal to End Lawsuit in 2021 Breach Follows a $4.2 Million Settlement in a 2019 Hack A Montana healthcare entity has agreed to pay $4.3 million to settle a proposed class action lawsuit filed in the wake of a 2021 hacking incident affecting 214,000 individuals. The deal is the entity's second multimillion-dollar lawsuit settlement in the last four years involving a major breach.

144
144
article thumbnail

Kevin Mitnick Hacked California Law in 1983

Schneier on Security

Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my new book , which he partially recounts his 2012 book, Ghost in the Wires. The setup is that he just discovered that there’s warrant for his arrest by the California Youth Authority, and he’s trying to figure out if there’s any way out of it.

Libraries 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European IoT Manufacturers Lag in Vulnerability Disclosure

Data Breach Today

Research Firm CEO Says IoT Makers Treat Cybersecurity as Somebody Else's Problem A review of internet of things manufacturers by Copper House shows that European companies fared the worst in having vulnerability disclosure policies. The European Commission has proposed legislation known as the Cyber Resilience Act that would make vulnerability disclosure policies mandatory.

article thumbnail

EDPB Publishes Report of Outcome of the Cookie Banner Taskforce

Hunton Privacy

On January 18, 2023, the European Data Protection Board (“EDPB”) published its Report on the work undertaken by the Cookie Banner Taskforce (the “Report”). The positions reflected in the Report result from the coordinated response of EU data protection authorities (“DPAs”) to the complaints filed by the non-governmental organization co-founded by privacy activist Max Schrems, None of Your Business (“NOYB”), that related to the requirements of cookie banners in the EU.

GDPR 111
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Coinbase Fined 3.3 Million Euros by Dutch Central Bank

Data Breach Today

Company Delayed Registering as a Money Transmitter, Say Bankers The Dutch central bank fined Coinbase 3.3 million euros, saying the U.S. cryptocurrency exchange failed to comply with the national anti-money laundering statute. Since May 2020, Dutch law has required crypto companies operating in the Netherlands to register as money transmitters.

144
144

More Trending

article thumbnail

ISMG Editors: Why Are Ransomware Profits Dipping?

Data Breach Today

Also: Consolidation Helps Microsoft Sales; Can ChatGPT Revolutionize Cybersecurity? In the latest weekly update, four ISMG editors discuss why it pays off to have well-practiced incident response plans, whether Chat GPT is a blessing or a curse for penetration testers and bug bounty hunters, and how Microsoft has reason to be cheerful as security sales hit $20 billion.

Sales 144
article thumbnail

3 Ways ChatGPT Will Change Infosec in 2023

Dark Reading

OpenAI's chatbot has the promise to revolutionize how security practitioners work.

Security 145
article thumbnail

Russian Nuisance Hacking Group KillNet Targets Germany

Data Breach Today

Berlin Pledges Leopard 2 Tanks for Ukraine, Provoking Passing DDoS Attacks A pro-Kremlin hacking group with a history of launching distributed denial-of-service attacks took its annoyance tactics to Germany following Berlin's announcement that it will ship Leopard 2 battle tanks to Ukraine's front lines. A German government spokesperson said the attacks had minimal effect.

article thumbnail

Hackers Use RMM Software to Breach Federal Agencies

eSecurity Planet

Cybercriminals recently breached U.S. federal agencies using remote monitoring and management (RMM) software as part of a widespread campaign. The malicious campaign began in June 2022 or earlier and was detected a few months later, according to an advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Payments Rules Bring Customer Authentication to Forefront

Data Breach Today

FIDO Alliance's Hulka on Why Customers and Providers Like Payment Confirmation Payment regulations in Europe have forced retailers to implement strong authentication that's phishing-resistant and facilitates more customer understanding, says FIDO Alliance's Christina Hulka. This has spurred a push for clients to confirm what they're purchasing and how much they wish to spend.

article thumbnail

Patch management is crucial to protect Exchange servers, Microsoft warns

Security Affairs

Microsoft warns customers to patch their Exchange servers because attackers always look to exploit unpatched installs. Microsoft published a post to urge its customers to protect their Exchange servers because threat actors actively attempt to exploit vulnerabilities in unpatched installs. The IT giant recommends installing the latest available Cumulative Update (CU) and Security Update (SU) on Exchange servers “There are too many aspects of unpatched on-premises Exchange environments that

Cloud 95
article thumbnail

Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign

Dark Reading

Google has mounted a massive takedown, but Dragonbridge's extensive capabilities for generating and distributing vast amounts of largely spammy content calls into question the motivation behind the group.

89
article thumbnail

CVE-2023-23560 flaw exposes 100 Lexmark printer models to hack

Security Affairs

Lexmark released a security firmware update to fix a remote code execution flaw, tracked as CVE-2023-23560, that impacts more than 100 printer models. Lexmark has released a security firmware update to address a remote code execution vulnerability, tracked as CVE-2023-23560, that impacts more than 100 printer models. The CVE-2023-23560 flaw is a server-side request forgery (SSRF) in the Web Services feature of Lexmark printers, it received a CVSS score 9.0. “A Server-Side Request Forgery (

Access 92
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Critical RCE Lexmark Printer Bug Has Public Exploit

Dark Reading

A nasty SSRF bug in Web Services plagues a laundry list of enterprise printers.

129
129
article thumbnail

Hacker's Movie Guide: The Complete List of Hacker and Cybersecurity Movies

KnowBe4

Is alert fatigue getting to you? I found a guide that allows you some well-deserved personal downtime, and still has something to do with work so that you can justify getting away with taking some PTO and veg out. But sometimes there are 1,000 channels and it still looks like there is nothing to watch. This might help.

article thumbnail

ADS-B Exchange, the Flight Tracker That Powered @ElonJet, Sold to Jetnet

WIRED Threat Level

ADS-B Exchange, beloved for resisting censorship, was sold to a company owned by private equity—and now even its biggest fans are bailing.

IT 96
article thumbnail

On Data Privacy Day, Organizations Fail Data Privacy Expectations

Dark Reading

Data Privacy Day rolls around year after year, and data privacy breaches likewise. Two-thirds of data breaches result in data exposure.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

Hacker accused of having stolen personal data of all Austrians and more

Security Affairs

A Dutch hacker who was arrested at the end of last year claims to have stolen the personal data of almost all Austrians. At the end of November 2022, the Amsterdam police arrested a 25-year-old man from Almere who is suspected of having stolen or traded the personal data of tens of millions of people around the world. The investigation into the activity of the man was launched by the Austrian Federal Criminal Investigation Service which spotted the man offering a dataset on a cybercrime forum in

article thumbnail

Weekly Update 332

Troy Hunt

Breaches all over the place today! Well, this past week, and there's some debate as to whether one of them is a breach, a scrape or if the term just doesn't matter anyway. Plus, we've been kitchen shopping, I'm helping friends out with connected doorbells and other random but somehow related things this week. Enjoy 😊 References I'll be "at" GOTO Aarhus in May (there online, but definitely speaking at the show) Following all the awesome input, we decided t

IT 81
article thumbnail

AI to Unlock Human Potential

Micro Focus

Despite the clickbait appeal of alarmist cyborg onslaught stories, the prospects of a more symbiotic rapport between humans and our machines are bright. The post AI to Unlock Human Potential first appeared on Micro Focus Blog.

article thumbnail

Why Most Companies Still Don’t Know What’s on Their Network

Dark Reading

Chris Kirsch, CEO of runZero, sits down with Dark Reading’sTerry Sweeney for a Fast Chat on the importance of asset discovery.

91
article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

2022 Retail Industry Year in Review

Hunton Privacy

On January 25, 2023, Hunton Andrews Kurth’s retail industry team released its annual Retail Industry in Review publication, which provides an overview of key issues and trends that impacted the retail sector in the past year, as well as a preview of relevant legal issues retailers can expect to arise in 2023. This year’s publication highlights key topics including cyber insurance, cybersecurity and privacy accountability, M&A activity, regulation and litigation related to PFAS, labor organiz

Retail 61
article thumbnail

Enterprises Don't Know What to Buy for Responsible AI

Dark Reading

Organizations are struggling to procure appropriate technical tools to address responsible AI, such as consistent bias detection in AI applications.

77
article thumbnail

Data Privacy 2023:  A reinvigorated data disposition strategy will bolster trust

OpenText Information Management

Data Privacy Day, held every year on January 28, is a time to raise awareness and promote data protection best practices that build trust. As we honor this day and mark a new year, the global privacy landscape continues to develop. For example, Australia recently passed new privacy reforms significantly increasing penalties for violations and … The post Data Privacy 2023: A reinvigorated data disposition strategy will bolster trust appeared first on OpenText Blogs.

article thumbnail

Enterprises Need to Do More to Assure Consumers About Privacy

Dark Reading

Organizations care about data privacy, but their priorities appear to be different from what their customers think are important.

Privacy 79
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

A Guide to Phishing Attacks

Schneier on Security

This is a good list of modern phishing techniques.

Phishing 105
article thumbnail

Telemetry series: Collection and Storage (SIEM)

Jamf

Part two of the blog series on telemetry explores the data-gathering and storage aspects of collecting rich telemetry data. Also, exploring what options are available to organizations to meet their needs, as well as some useful tips to consider when preparing to work with granular data and how to leverage it into actionable tasks, such as how it can inform management workflows.

IT 52
article thumbnail

Remembering the Holocaust To Promote Social Justice, Human Rights, And Genocide Awareness

Hanzo Learning Center

Today is the 78th anniversary of the liberation of Auschwitz-Birkenau, the largest of the Nazi death camps. On this Holocaust Memorial Day, we remember all of those who were killed in genocides across the world. The most infamous of these genocides is the Holocaust, where six million Jews were killed in death camps, alongside other marginalized groups such as the Roma, disabled people, homosexuals, and political enemies.

52